Bültmann & Gerriets
Fault Diagnosis and Tolerance in Cryptography
Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings
von Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert
Verlag: Springer Berlin Heidelberg
Reihe: Lecture Notes in Computer Science Nr. 4236
Reihe: Security and Cryptology
E-Book / PDF
Kopierschutz: PDF mit Wasserzeichen

Hinweis: Nach dem Checkout (Kasse) wird direkt ein Link zum Download bereitgestellt. Der Link kann dann auf PC, Smartphone oder E-Book-Reader ausgeführt werden.
E-Books können per PayPal bezahlt werden. Wenn Sie E-Books per Rechnung bezahlen möchten, kontaktieren Sie uns bitte.

ISBN: 978-3-540-46251-4
Auflage: 2006
Erschienen am 11.10.2006
Sprache: Englisch
Umfang: 258 Seiten

Preis: 53,49 €

53,49 €
merken
zum Hardcover 53,49 €
Inhaltsverzeichnis
Klappentext

Attacks on Public Key Systems.- Is It Wise to Publish Your Public RSA Keys?.- Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered.- Attacking Right-to-Left Modular Exponentiation with Timely Random Faults.- Sign Change Fault Attacks on Elliptic Curve Cryptosystems.- Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection.- Protection of Public Key Systems.- Blinded Fault Resistant Exponentiation.- Incorporating Error Detection in an RSA Architecture.- Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation.- Attacks on and Protection of Symmetric Key Systems.- Case Study of a Fault Attack on Asynchronous DES Crypto-Processors.- A Fault Attack Against the FOX Cipher Family.- Fault Based Collision Attacks on AES.- An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers.- Models for Fault Attacks on Cryptographic Devices.- An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices.- Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults.- A Comparative Cost/Security Analysis of Fault Attack Countermeasures.- Fault-Resistant Arithmetic for Cryptography.- Non-linear Residue Codes for Robust Public-Key Arithmetic.- Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection.- Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography.- Fault Attacks and Other Security Threats.- DPA on Faulty Cryptographic Hardware and Countermeasures.- Fault Analysis of DPA-Resistant Algorithms.- Java Type Confusion and Fault Attacks.



This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006, held in Yokohama, Japan in October 2006.

The 12 revised papers of FDTC 2006 are presented together with nine papers from FDTC 2004 and FDTC 2005 that passed a second round of reviewing. They all provide a comprehensive introduction to the issues faced by designers of robust cryptographic devices.


andere Formate
weitere Titel der Reihe